1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
9

What command prompts should be used to assign an IP address to:

Computers and Technology
1 answer:
S_A_V [24]3 years ago
7 0

Answer:

...

Explanation:

A. Cisco Router

1. Enter global configuration mode using the next commands:

Router>enable

Router#configure terminal

2. enters the configuration mode for a Gigabit Ethernet interface on the router using this command:

interface gigabitethernet slot/port

Example:

Router(config)# interface gigabitethernet 0/1

3. Set the IP address and subnet mask for the specified GE interface using this command:

ip address x.x.x.x y.y.y.y

Example:

Router(config-if)# ip address 192.168.0.1 255.255.255.0

4. Finally, enable the GE interface, changing its state from administratively down to administratively up:

Router(config-if)# no shutdown

Exit configuration mode for the GE interface and returns to global configuration mode using this:

Router(config-if)# exit

B. Cisco Switch

Normally Cisco switches forward Ethernet frames without any configuration. so you don´t need to assign them an IP address, but to perform switch management over the network or use protocols such as SNMP, the switch will need to have an IP address. Here are the steps:

1. Enter global configuration mode using the next commands:

Switch>enable

Switch#configure terminal

2. Enter the VLAN 1 configuration mode:

Switch(config)#int vlan 1

3. Assign an IP address with the ip address IP ADDRESS SUBNET MASK interface subcommand.

Example:

Switch(config-if)#ip address 10.0.0.1 255.0.0.0

4. Enable the VLAN 1 interface with the no shutdown interface subcommand.

example:

SW1(config-if)#no shutdown

C. Local PC

1. Click Start Menu > Control Panel > Network and Sharing Center or Network and Internet > Network and Sharing Center.

2. Click Change adapter settings.

3. Right-click on Wi-Fi or Local Area Connection.

4. Click Properties.

5. Select Internet Protocol Version 4 (TCP/IPv4).

6. Click Properties.  

7. Select Use the following IP address.

8. Enter the IP address, Subnet mask, Default gateway, and DNS server.

9. Click OK.

You might be interested in
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
Licemer1 [7]

Answer:

Please kindly check explainations for the code.

Explanation:

lw $t1, Num1

lw $t2, Num2

lw $t3, Num3

blt $t1, $t2, if

beq $t1, $t2, elseif

else:

add $t0, $t3, 5

sw $t0, Result

endif:

#.....other statements after if-elseif-else

if:

sw $t1, Result

b endif

elseif:

ble $t2, $t3, if2

or $t0, $t1, $t3

sw $t0, Result

b endif

if2:

and $t0, $t2, $t3

sw $t0, Result

b endif

Go to attachment for the onscreen code.

4 0
4 years ago
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log
klemol [59]

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

3 0
3 years ago
is a programming model that focuses on an application's components and data and methods the components use. Group of answer choi
ZanzabumX [31]

Object-oriented programming is a programming model that focuses on an application's components and data and methods the components use.

<h3>What is Object-oriented programming (OOP)?</h3>

This is known to be a form of  a programming paradigm that is known to be due to the idea of "objects", that often contain data and code.

Note that, Object-oriented programming is a programming model that focuses on an application's components and data and methods the components use.

Learn more about programming model from

brainly.com/question/22654163

#SPJ1

7 0
2 years ago
Does anyone know the answer to this question??
Ket [755]
The type of letter they are looking for is an Inquiry Letter. 
An Inquiry letter asks questions or elicits info from the recipient. They would include what they are looking for or what they need to know about. They should include any info to reach back to them. 
6 0
4 years ago
Other questions:
  • A technician, joe, has replaced a faulty 500 gb hard drive in a pc system with a 1 tb hard drive. however, after the replacement
    10·1 answer
  • --------------------is a host that runs software to provide information, such as web content, to other hosts.
    9·1 answer
  • What is an administrator?
    15·1 answer
  • Can someone help me with this
    10·1 answer
  • Match each career to its various job roles. digital media coordinator digital media specialist photographer sound producer creat
    13·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • Which one way in which using infrared in game console controllers could affect the experience of a person playing the game?
    8·1 answer
  • Please answer.
    9·1 answer
  • 1. Using a microphone to create an audio file to accompany a message is an example of how data is processed and sent to an outpu
    9·1 answer
  • Organizations can face criminal or civil penalties for being ______ in protecting their sensitive data.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!